The problem of biometric sensor interoperability has received limited attention in the literature. Most biometric systems operate under the assumption that the data (viz., images) ...
Humans should be able to think of computers as extensions of their body, as craftsmen do with their tools. Current security models, however, are too unlike those used in human min...
Cases are widely used in professional education to engage learners with examples of real world practices. Collaboration in casebased learning can add to the authenticity of the ex...
Lu Xiao, John M. Carroll, Pat Clemson, Mary Beth R...
t a single security abstraction layer, but rather is a roblem spanning multiple abstraction levels. We use an embedded biometric authentication device to demonstratethenecessityofa...
David Hwang, Patrick Schaumont, Kris Tiri, Ingrid ...
This paper presents au approach to extend OSGi server based home networks with JXTA’s peer-topeer (PZP) technoIogy to a mzdti-server home environment connecting multiple private...